

Episode 97: Bcrypt Hash Input Truncation & Mobile Device Threat Modeling
Nov 14, 2024
Dive into the world of cybersecurity as experts dissect recent vulnerabilities in bcrypt, revealing insights into multi-factor authentication risks. Explore the layered security challenges in mobile environments and learn about clever techniques for concealing payloads in URLs. The introduction of the Lightyear tool for PHP exploits highlights the importance of evolving security measures, while discussions on advanced XSS exploitation techniques underscore the need for robust web application defenses. It's a treasure trove of information for security enthusiasts!
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7
Intro
00:00 • 2min
Vulnerabilities in Bcrypt and Mobile Security
02:29 • 18min
Concealing Payloads in URLs
20:32 • 10min
Navigating Tools and Knowledge in PHP Hacking
30:29 • 2min
Evolving Security Measures in PHP Filter Chains
32:12 • 2min
Exploring Security Configurations and New Opportunities in Attack Surface Management
33:51 • 2min
Advanced XSS Exploitation Techniques
35:31 • 18min